New Stories

From REVENUE ASSURE

A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow

interview with Carla Cardoso & Bernado Lucas & Thomas Steagall

A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow

Leading risk management consultants explain their mission and walk-through RA, subscription fraud, and collections cases.  They also explain how analytics and machine learning can supplement process optimization.

From SECURITY

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

interview with Kiran Zachariah

A leader in IoT security monitoring and protection services explains the many challenges of IoT security and how his firm is exploiting its deep research and honeypots to protect telecom, industrial, and automotive OEM clients.

From FRAUD CONTROL

“Moments Matter” in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers

interview with Kathy Timko

Matching the porting history of a telephone number to a carrier of record is now crucial to identity/credit checks by financial, healthcare, and other firms in the U.S. Learn how fraudsters exploit carrier porting processes to perform account takeover in 10 minutes; and why freshly updated porting data is needed to combat $17 billion in identity fraud.

More Stories

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight From FRAUD CONTROL

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight

interview with Miguel Carrero

Security-breach-driven fraud is on the increase as fraudsters gain deeper  knowledge of telecom spheres such as roaming.  Using five fraud cases, an expert shows how advanced signaling techniques are taking fraud control to a higher level.

From REVENUE ASSURE

PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers

interview with Seth Heine

An expert in the mobile phone reverse supply chain explains how MNOs — via a neutral third party information exchange — can recover their original phones on the used market and save huge sums in multi-year customer retention.

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control From FRAUD CONTROL

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control

interview with Dan Baker & Colin Yates

The IPRN Database is a powerful new tool for helping control IRSF and Wangiri frauds.  The pioneer of the category explains the value and use of the IPRN Database in this 14-page Black Swan Solution Guide.

ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database From B/OSS

ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database

interview with Joe McDermott & Frank McDermott

A firm offering a cloud-based network inventory system explains the virtues of: a single underlying database, flexible conversions, task-checking workflow, new software business models, views that identify stranded assets, and connecting to Microsoft’s cloud platform.

Tethering Fraud: How Guavus Blocks the Pumping of Mobile Data Traffic and Tools Up to Deliver 5G Service Management From FRAUD CONTROL

Tethering Fraud: How Guavus Blocks the Pumping of Mobile Data Traffic and Tools Up to Deliver 5G Service Management

interview with Kent McIntosh & David Yates

How is analytics being applied to next generation data threats?  Learn how tethering fraud occurs and is detected.  Also discussed are: data volume reduction at the network edge, IoT fraud concerns, and automating the healing of high-quality 5G data services.

How GBSD Enables Advanced and Flexible Real-Time Fraud Blocking with its High-Trust, Mobile-Network-Embedded Softswitch From FRAUD CONTROL

How GBSD Enables Advanced and Flexible Real-Time Fraud Blocking with its High-Trust, Mobile-Network-Embedded Softswitch

interview with Jeffrey Ross

Learn about a close-to-the-network platform that blocks mobile fruad, Reading a variety of protocols and integrated with external applications, it’s being used to combat: Wangiri, IRSF, SIM box bypass, and mobile money fraud.

White Paper: A Real-Time Cloud Service to Protect the Enterprise PBX from IRSF Fraud From FRAUD CONTROL

White Paper: A Real-Time Cloud Service to Protect the Enterprise PBX from IRSF Fraud

by Dan Baker

Learn how a new cloud-based solution developed by Oculeus, any enterprise can protect its PBX from IRSF fraud for as little as $5 a month.

Recent Articles